Learn from the Tenchi Team!
Insights and news


How Secure Build Practices Protected Us from the Trivy Supply Chain Attack
This post outlines our findings and, more importantly, the specific security controls that ensured our repositories remained unaffected.
Filters

28/1/2026
Supply chain vulnerabilities are a major challenge for cyber resilience: an analysis of the WEF report
Research
Supply Chain Security
TPCRM

29/12/2025
The most relevant third-party cybersecurity incidents of 2025
TPCRM
Supply Chain Security
News

27/11/2025
The impact of GRC Engineering on Third-Party Cyber Risk Management
News
Supply Chain Security
TPCRM
Research

21/10/2025
How third-party cyber risk management could have mitigated banking incidents in Brazil
No items found.

5/9/2025
Inside-out vs. outside-in monitoring in third-party risk management: understanding the differences
Supply Chain Security
TPCRM
News

19/8/2025
How continuous monitoring for third-party risk management helps your incident response
TPCRM
Supply Chain Security

15/8/2025
Tenchi’s Essence: Who We Are and How We Grow
No items found.

1/8/2025
Best API Practices for Integration with Security Tools
Training
Research
Supply Chain Security
TPCRM

8/7/2025
How geopolitics and trade policies impact third-party risks (and what businesses can do about it)
Research
Supply Chain Security
News

10/6/2025
What does Third-Party Cyber Risk Management mean for third parties?
News
TPCRM
Supply Chain Security

13/5/2025
Third-party cyber risk rises above the fold: the Verizon 2025 Data Breach Investigations Report (DBIR)
News
Research
Supply Chain Security
TPCRM

14/4/2025
The 'security poverty line' and its impact on third-party cyber risk
News
Research
Supply Chain Security

11/3/2025
The telecom industry's growing exposure to third-party cyber risks: what you need to know
News
Supply Chain Security
TPCRM

15/1/2025
Key trends for third-party cyber risk management in 2025
Supply Chain Security
News

10/12/2024
Looking back at third-party breaches and vendor cybersecurity incidents in 2024
Research
TPCRM

13/8/2024
Why sharing third-party cybersecurity evaluations with other companies might not work for your business
No items found.

12/6/2024
Data breaches beyond numbers: a third-party cyber risk management perspective
News
Research
Supply Chain Security

30/5/2024
The new partnership between Tenchi and ABBC boosts cybersecurity for the brazilian banking ecosystem
No items found.

4/4/2024
Fixing AWS Step Function errors due to reference to inactive AWS Batch Job Definition revisions
No items found.

1/2/2024
Tenchi Security raises a $7 million Series A from Bradesco, L4 Venture Builder, and Accenture
No items found.

23/11/2023
Reviewing Tenchi’s Tech Stack four years later
No items found.

20/7/2023
Frontending – A brief history of webdev – Part 1
No items found.

26/5/2023
Treating errors in AWS Step Functions
No items found.

13/4/2023
Manipulating roles and permissions in Microsoft 365 environment via MS Graph
No items found.

18/11/2021
Tenchi Security brings in Google and Apple alum to lead product development
No items found.

19/10/2021
Tenchi Security raises a US$3.3MM seed round to improve transparency and security in the cloud
No items found.

2/11/2020
AWS Managed IAM Policies
No items found.

21/10/2020
Detecting abuse in the AWS control plane in an actionable wayusing Det{R}ails
No items found.

18/6/2020
A Simple Unauthenticated Technique to Determine if an AWS IAM or root User has MFA Enabled
No items found.

18/2/2020
Analyzing AWS Inspector Usage
No items found.

14/11/2019
AWS Two Factor Authentication – what are the differences between SSO and IAM?
No items found.

14/10/2019
Tenchi Security acquires BlueOps
No items found.
No results found.
There are no results with this criteria. Try changing your search.


















